Technical presentation - 30 minutes (including q&a)
Attested TLS is an essential ingredient of any confidential computing solution. In this talk, we explore the design space and the corresponding typical security and performance tradeoffs of attested TLS protocols. We also summarize the standardization efforts on such protocols in the IETF. We then present what security properties are required from the attestation framework, and demonstrate how formalization can help get strong security guarantees. The attendees will learn best practices for using attested TLS in confidential computing to improve the Arm CCA ecosystem.